Monday, January 25, 2010

LAW OF PRIVACY PROTECTING AND LAW?

In a consumer protection approach, in contrast, it is acknowledged that individuals may not have the time or knowledge to make informed choices, or may not have reasonable alternatives available. This approach advocates greater government definition and enforceIn a consumer protection approach, in contrast, it is acknowledged that individuals may not have the time or knowledge to make informed choices, or may not have reasonable alternatives available. This approach advocates greater government definition and enforcement of privacy standards.

What is Piracy?

Privacy is...Most Web users want to understand that personal information they share will not be shared with anyone else without their permission. An annual survey conducted by the Graphics, Visualization and Usability Center of the Georgia Institute of Technology showed that 70% of the Web users surveyed cited concerns about privacy as the main reason for not registering information with Web sites. 86% indicated that they wanted to be able to control their personal information. A study by truste revealed that 78% of users surveyed would be more likely to provide information to sites that offered privacy assurance.

Monday, January 18, 2010

Who are the computer criminals

Who are the computer criminals

The computer criminals are those who commit crimes not just only a crime but a serious crime like hacking in the private Websites!!The Objectives of Computer Criminals


Computer criminals have different objectives. An underground network of hackers helps pass along secrets of success.

Monday, January 11, 2010

>>ZERO-DAY ATTACKS<<

Zero day attack, also known as a zero hour attack, takes advantage of computer vulnerabilities that do not currently have a solution. Typically, a software company will discover a bug or problem with a piece of software after it has been released and will offer a patch another piece of software meant to fix the original issue. A zero day attack will take advantage of that problem before a patch has been created. It is named zero day because it occurs before the first day the vulnerability is known.

Monday, January 4, 2010

What would you do?

1.Your friend just told you that he is developing a worm to attack the administrative system at your college.The worm is "harmless"& will simply course a message._"Lets Party"_to be displayed on the workstations on Friday afternoon at 3pm,the virus will erase itself and destroy all the evidence of its presence.What would you say or do?

For me I just told him that bad to the IT user and the society.I just remain them that is not good and give them some advice.

2You have just been hired as an IT security consultant to"fix the security problem" at a manufacturing company.The company has been hacked mercilessly over the last six months w/ three of the attacks making headlines for the negative impact they have in the firm & its customers. You have been given 90 days an a budget of $1 million where would you begin,and what steps would you take to fix the problem?

For me i accept the opportunity and try my best to fix the problem,i try my ability on this case so that i can help them.